Skip to main content

Real words or buzzwords?: True Cloud

I first heard the words “True Cloud” at a security conference where Dean Drako, founder and owner of Eagle Eye Networks and owner of Brivo Systems, explained why he coined the term. Previously, there was no terminology to make a distinction between a simple server application being hosted in the cloud, and a server application […]

10 Triggers for Transition

A key area where organizations need help from security integrators is in the assessment of their current access control solutions and whether and when to make the transition to new technology.  Organizations often delay transitions over budget concerns or because of worries that the process will adversely impact productivity and workflow.  But these delays can […]

Video Analytics for Security and Beyond

Despite the huge amount of video data collected, statistics show that only 10 percent of data is ever used and most lose its value within seconds of being generated. Why use such a limited amount of data? Many security organizations are focused on delivering the right information in case of an emergency or providing the […]

Securing the Perimeter Takes on New Meaning

Whether you’re considering the perimeter of a massive urban center like Atlanta or a Network Access Point (NAP), a public exchange center, you’ll need to think big. How big is Atlanta’s perimeter, bound by Interstate 285? Amsterdam, Bagdad, New Delhi, Paris, Las Vegas, Denver, Nashville, Washington D.C. all fit inside Atlanta’s Beltline. The “perimeters” of […]

Aligning Healthcare Information Security and Safety

As today’s healthcare providers contend with the combination of tightening regulations, decreasing reimbursement and other economic challenges, they also must ensure data security while protecting the physical security of their facilities. These dual security concerns involve different departments with different roles and responsibilities; both groups are critically important to ensuring the reputation of an institution, […]

Fire Alarm Retrofits – Who Should Decide What Equipment to Use?

By Marty Smith, SET Red Hawk Fire & Security Mid-Atlantic Region Manager  The owners or facilities managers of older buildings are frequently faced with the need to replace all or part of an aging fire alarm system. Replacing or retrofitting an antiquated fire alarm system is usually an unwelcome development especially for those untrained in […]

Fixing the gaps in your PACS

Over the years, wrongdoers have used physical access control system (PACS) weaknesses to commit bad acts, some of a serious criminal nature. Some vulnerabilities in these incidents were due to system design flaws, while others could be attributed to poor data security practices. Here are several true stories that highlight the real world consequences of […]

Page 3 of 10« First...234...10...Last »
Want to place your system on test with the central station? Click here
Would you like to build your inspection reports? Click here
Read the Red Hawk Observer Newsletter Articles. Click here
Would you like a free, no obligation survey of your business? Click here

*Not all services shown on our website are available in all jurisdictions. Please check with your local Red Hawk office to determine which services can be performed by the Red Hawk office in your area.
logo_ul_listed logo_csaa logo_sia SDM100 FAST50